Journal articles on the topic 'Data Encryption Standard (DES)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data Encryption Standard (DES).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Silva G., Víctor M., Eduardo Rodríguez Escobar, and Eduardo Vega Alvarado. "Criptografía: Data Encryption Standard." Polibits 30 (July 20, 2004): 3–5. http://dx.doi.org/10.17562/pb-30-1.
Full textCoppersmith, Don, Chris Holloway, Stephen M. Matyas, and Nev Zunic. "The data encryption standard." Information Security Technical Report 2, no. 2 (January 1997): 22–24. http://dx.doi.org/10.1016/s1363-4127(97)81325-8.
Full textHighland, HaroldJoseph. "Data encryption standard II?" Computers & Security 6, no. 3 (June 1987): 195–96. http://dx.doi.org/10.1016/0167-4048(87)90095-2.
Full textM, Jayasarathi, Rajeshwari S, Shiny Mercy I, and Rathika S.K.B. "Enhanced on Data Encryption Standard for Secured Cloud Storage." Bonfring International Journal of Software Engineering and Soft Computing 9, no. 1 (March 29, 2019): 07–10. http://dx.doi.org/10.9756/bijsesc.9004.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textKasiran, Zolidah, Hikma Farah Ali, and Noorhayati Mohamed Noor. "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (November 1, 2019): 988. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp988-994.
Full textKumar, Sanjay, and Sandeep Srivastava. "Image Encryption using Simplified Data Encryption Standard (S-DES)." International Journal of Computer Applications 104, no. 2 (October 18, 2014): 38–42. http://dx.doi.org/10.5120/18178-9070.
Full textOkazaki, Hiroyuki, and Yasunari Shidama. "Formalization of the Data Encryption Standard." Formalized Mathematics 20, no. 2 (December 1, 2012): 125–46. http://dx.doi.org/10.2478/v10037-012-0016-y.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textSimran, Simran, and Parminder Singh Jassal. "Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 775–78. http://dx.doi.org/10.31142/ijtsrd14159.
Full textSchaefer, Edward F. "A SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM." Cryptologia 20, no. 1 (January 1996): 77–84. http://dx.doi.org/10.1080/0161-119691884799.
Full textSmid, M. E., and D. K. Branstad. "Data Encryption Standard: past and future." Proceedings of the IEEE 76, no. 5 (May 1988): 550–59. http://dx.doi.org/10.1109/5.4441.
Full textMenkus, Belden. "Re-examining the Data Encryption Standard." Computers & Security 11, no. 8 (December 1992): 703–6. http://dx.doi.org/10.1016/0167-4048(92)90089-a.
Full textR. Arboleda, Edwin, Joel L. Balaba, and John Carlo L. Espineli. "Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling." Bulletin of Electrical Engineering and Informatics 6, no. 3 (September 1, 2017): 219–27. http://dx.doi.org/10.11591/eei.v6i3.627.
Full textPriyanto, Dadang, and Raesul Azhar. "Sistem Aplikasi Untuk Keamanan Data Dengan Algoritma 'Des' (Data Encryption Standard)." Jurnal Matrik 16, no. 1 (July 26, 2017): 67. http://dx.doi.org/10.30812/matrik.v16i1.12.
Full textBenzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (February 1, 2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.
Full textPutrodjojo, Gunawan, Julhan H. Purba, and Junawano Candra. "APLIKASI ALGORITMA DES (DATA ENCRYPTION STANDARD) UNTUK PENGAMAN DATA." CCIT Journal 10, no. 1 (February 1, 2017): 62–74. http://dx.doi.org/10.33050/ccit.v10i1.518.
Full textMokhtar, M. Amr. "High Performance Data Encryption based on Advanced Encryption Standard using FPGA." IOSR Journal of Computer Engineering 16, no. 6 (2014): 07–13. http://dx.doi.org/10.9790/0661-16650713.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 14, 2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textS.More, Sharmila, Bhawna Narain, and B. T. Jadhav . "Data Encryption Standard Algorithm in Multimodal Biometric Image." International Journal of Computer Sciences and Engineering 6, no. 8 (August 31, 2018): 869–74. http://dx.doi.org/10.26438/ijcse/v6i8.869874.
Full textChen, Zhihua, and Xiutang Geng. "Efficient DNA Sticker Algorithms to Data Encryption Standard." Journal of Computational and Theoretical Nanoscience 7, no. 5 (May 1, 2010): 840–47. http://dx.doi.org/10.1166/jctn.2010.1429.
Full textYu, Yang, and Shi Min Wang. "The IC Card Data Encryption Research Based on the AES Algorithm." Applied Mechanics and Materials 220-223 (November 2012): 2698–701. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2698.
Full textPratistha, Indra, and Paholo Iman Prakoso. "Sistem Keamanan Data Text Dengan Data Encryption Standard (DES) Dan Metode Least Significant Bit (LSB)." Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI) 1, no. 2 (December 31, 2018): 11–20. http://dx.doi.org/10.33173/jsikti.16.
Full textPermana, Angga Aditya, and Desi Nurnaningsih. "APPLICATION OF CRYPTOGRAPHY WITH DATA ENCRYPTION STANDARD (DES) ALGORITHM IN PICTURE." JIKA (Jurnal Informatika) 4, no. 2 (May 31, 2020): 9. http://dx.doi.org/10.31000/jika.v4i2.2640.
Full textNurdin, Dahlan Abdullah, Widia Fatimah, R. Ratnadewi, Nuning Kurniasih, Dian Rianita, Berliana Kusuma Riasti, et al. "Sms Encryption Application Using 3Des (Triple Data Encryption Standard) Algorithm Based on Android." Journal of Physics: Conference Series 1363 (November 2019): 012077. http://dx.doi.org/10.1088/1742-6596/1363/1/012077.
Full textAdil Yazdeen, Abdulmajeed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, and Rizgar R. Zebari. "FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review." Qubahan Academic Journal 1, no. 2 (March 15, 2021): 8–16. http://dx.doi.org/10.48161/qaj.v1n2a38.
Full textRatnadewi, Roy Pramono Adhie, Yonatan Hutama, A. Saleh Ahmar, and M. I. Setiawan. "Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)." Journal of Physics: Conference Series 954 (January 2018): 012009. http://dx.doi.org/10.1088/1742-6596/954/1/012009.
Full textOukili, Soufiane, and Seddik Bri. "High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 298. http://dx.doi.org/10.11591/ijece.v6i1.8388.
Full textOukili, Soufiane, and Seddik Bri. "High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 298. http://dx.doi.org/10.11591/ijece.v6i1.pp298-306.
Full textYanti, Neti Rusri, Alimah Alimah, and Desi Afrida Ritonga. "Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (March 27, 2018): 23. http://dx.doi.org/10.30645/j-sakti.v2i1.53.
Full textKannan, M. "Ultra Encryption Standard algorithm Based Data Security in WSN." Indian Journal of Public Health Research & Development 9, no. 2 (2018): 466. http://dx.doi.org/10.5958/0976-5506.2018.00170.5.
Full textKumar, Dr M. Jaya, and Mr R. Nandha Kumar. "Double Way Protection of Trible Data Encryption Standard Algorithm." IJARCCE 5, no. 12 (December 30, 2016): 56–61. http://dx.doi.org/10.17148/ijarcce.2016.51211.
Full textGarg, Purvi. "Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm." American Journal of Networks and Communications 4, no. 3 (2015): 32. http://dx.doi.org/10.11648/j.ajnc.20150403.12.
Full textNawazKhan, Muhammad, Ishtiaq Wahid, and Atual Aziz Ikram. "The FastDES: A New Look of Data Encryption Standard." International Journal of Computer Applications 39, no. 11 (December 29, 2012): 28–33. http://dx.doi.org/10.5120/4865-7249.
Full textADLEMAN, LEONARD M., PAUL W. K. ROTHEMUND, SAM ROWEIS, and ERIK WINFREE. "On Applying Molecular Computation to the Data Encryption Standard." Journal of Computational Biology 6, no. 1 (January 1999): 53–63. http://dx.doi.org/10.1089/cmb.1999.6.53.
Full textRabah, Kefa. "Theory and Implementation of Data Encryption Standard: A Review." Information Technology Journal 4, no. 4 (September 15, 2005): 307–25. http://dx.doi.org/10.3923/itj.2005.307.325.
Full textNeelima, S., and R. Brinda. "Implementation of various data encryption methods for medical information transmission." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 219. http://dx.doi.org/10.14419/ijet.v7i2.31.13446.
Full textSharma, Samiksha, and Vinay Chopra. "Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman." International Journal of Security and Its Applications 11, no. 3 (March 31, 2017): 17–28. http://dx.doi.org/10.14257/ijsia.2017.11.3.02.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textZhang, Xiaoqiang, and Xuesong Wang. "Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard." Applied Sciences 8, no. 9 (September 3, 2018): 1540. http://dx.doi.org/10.3390/app8091540.
Full textHussien, Marwah K. "Encryption of Stereo Images after Compression by Advanced Encryption Standard (AES)." Al-Mustansiriyah Journal of Science 28, no. 2 (April 11, 2018): 156. http://dx.doi.org/10.23851/mjs.v28i2.511.
Full textMesrega, Ahmed K., Walid El-Shafai, Hossam Eldin H. Ahmed, Nirmeen A. El-Bahnasawy, Fathi E. Abd El-Samie, and Abdulaziz E. Elfiqi. "A Hybrid Modified Advanced Encryption Standard and Chaos Encryption Algorithm for Securing Compressed Multimedia Data." Menoufia Journal of Electronic Engineering Research 28, no. 1 (March 10, 2020): 63–70. http://dx.doi.org/10.21608/mjeer.2020.76761.
Full textAtika Sari, Christy, Eko Hari Rachmawanto, and Christanto Antonius Haryanto. "Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security." Scientific Journal of Informatics 5, no. 2 (November 29, 2018): 105–17. http://dx.doi.org/10.15294/sji.v5i2.14844.
Full textAhmed, Kareem, and Ibrahim El-Henawy. "Increasing robustness of data encryption standard by integrating DNA cryptography." International Journal of Computers and Applications 39, no. 2 (February 22, 2017): 91–105. http://dx.doi.org/10.1080/1206212x.2017.1289690.
Full textWahyudi, Erfan, Bahtiar Imran, Subektiningsih, and Akhmad Muzakka. "PENERAPAN ALGORITMA AES (ADVANCED ENCRYPTION STANDARD) DALAM PENYANDIAN KOMPRESI DATA." EXPLORE 8, no. 2 (July 1, 2018): 1. http://dx.doi.org/10.35200/explore.v8i2.135.
Full text., Zheng-Quan Xu, and Dereje Yohannes . "Theoretical Analysis of Linear Cryptanalysis Against DES (Data Encryption Standard)." Information Technology Journal 3, no. 1 (December 15, 2003): 49–56. http://dx.doi.org/10.3923/itj.2004.49.56.
Full textCoppersmith, D. "The Data Encryption Standard (DES) and its strength against attacks." IBM Journal of Research and Development 38, no. 3 (May 1994): 243–50. http://dx.doi.org/10.1147/rd.383.0243.
Full textHevia, Alejandro, and Marcos Kiwi. "Strength of two data encryption standard implementations under timing attacks." ACM Transactions on Information and System Security 2, no. 4 (November 1999): 416–37. http://dx.doi.org/10.1145/330382.330390.
Full textAli, Huda H., and Shaimaa H Shaker. "Modified Advanced Encryption Standard algorithm for fast transmitted data protection." IOP Conference Series: Materials Science and Engineering 928 (November 19, 2020): 032011. http://dx.doi.org/10.1088/1757-899x/928/3/032011.
Full textShepherd, Simon J. "A high speed software implementation of the Data Encryption Standard." Computers & Security 14, no. 4 (January 1995): 349–57. http://dx.doi.org/10.1016/0167-4048(95)00007-u.
Full text